Study on the application of digital certificates in the protection of network information security and data integrity

被引:0
|
作者
机构
[1] Li, Hehua
[2] Wu, Chunling
来源
Li, H. (493885444@qq.com) | 1600年 / Academy Publisher, P.O.Box 40,, OULU, 90571, Finland卷 / 08期
关键词
D O I
10.4304/jnw.8.11.2592-2598
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Application of security mechanisms in a telecommunications network based on digital certificates
    Vivas, T.
    Huerta, M.
    Zambrano, A.
    Clotet, R.
    Satizabal, C.
    IV LATIN AMERICAN CONGRESS ON BIOMEDICAL ENGINEERING 2007, BIOENGINEERING SOLUTIONS FOR LATIN AMERICA HEALTH, VOLS 1 AND 2, 2008, 18 (1,2): : 971 - +
  • [2] Data protection and information security of digital health applications (DiGA)
    Zilch, Andre
    Tschirsich, Martin
    BUNDESGESUNDHEITSBLATT-GESUNDHEITSFORSCHUNG-GESUNDHEITSSCHUTZ, 2021, 64 (10) : 1254 - 1261
  • [3] Network Information Security Data Protection Based on Data Encryption Technology
    Ping, Han
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 126 (03) : 2719 - 2729
  • [4] Network Information Security Data Protection Based on Data Encryption Technology
    Han Ping
    Wireless Personal Communications, 2022, 126 : 2719 - 2729
  • [5] Network Information Security and Protection Measures in the Age of Big Data
    Gao Wenling
    2019 4TH INTERNATIONAL WORKSHOP ON MATERIALS ENGINEERING AND COMPUTER SCIENCES (IWMECS 2019), 2019, : 191 - 193
  • [6] Study on Security and Protection Strategy of Computer Network Information
    Zhang, Chenxiang
    Proceedings of the 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016), 2016, 67 : 74 - 77
  • [7] Protection measurements of computer network information security for big data
    Fadhil, Saif Aamer
    Kadhim, Lubna Emad
    Abdurazaq, Sayl Gani
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (07): : 1959 - 1965
  • [8] The Security and Protection Strategy Study of Computer Network Information
    Shi, Junyan
    Li, Juanjuan
    Proceedings of the 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016), 2016, 67 : 34 - 37
  • [9] Blockchain user digital identity big data and information security process protection based on network trust
    Wang, Feng
    Gai, Yongjie
    Zhang, Haitao
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2024, 36 (04)
  • [10] Information security and data protection
    Qureshi, AA
    Siegel, JG
    INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2001, 14 (1-3) : 1 - 16